Programming Language
Cybersecurity
Random Fun Facts
Computer Science Concepts
Blast to the Past
100

This language is a top choice for AI and machine learning, thanks to TensorFlow and PyTorch.

What is Python?

100

This is the process of converting data into a secure format that cannot be easily read by unauthorized users.

What is encryption?

100

This search engine’s name was based on this number 10100

What is Google?

100

This type of programming paradigm is based on objects and classes.

What is object-oriented programming?

100

This internet used to disconnect when you pick up the phone.

What is dial-up

200

This language is commonly used for web development alongside HTML and CSS.

What is JavaScript?

200

This type of attack floods a system with excessive traffic to overwhelm it.

What is a DDoS attack?

200

In this popular Valve game TF2, when the image file was removed, the game broke.

What is a coconut.jpg

200

This algorithmic analysis measures how an algorithm's performance scales with input size.

What is Big O notation?

200

This is now the save icon on most word-processing applications

What is a floppy disk

300

This language is used a lot in Android app development and shares its name with coffee.

What is Java?

300

This cyber attack involves disguising malicious software as a legitimate program.

What is a Trojan horse?

300

This popular AI language model was first released by OpenAI in 2020.

What is GPT-3 (Generative Pre-trained Transformer - 3)?

300

In concurrency, this problem occurs when multiple threads attempt to modify shared data at the same time.

What is a race condition?

400

This programming language, commonly used in game development, is the primary language of the Unity engine.

What is C#?

400

A "zero-day exploit" refers to a vulnerability that is what?

What is unknown to the software vendor?

400

The name of this digital assistant on Windows is derived from a character in the Halo video game series.

What is Cortana?

400

This principle in object-oriented programming allows a child class to acquire the properties and behaviors of a parent class.

What is inheritance?

400

This mobile phone brand was known for its near-indestructible design and the game Snake.

What is Nokia?

500

This language is commonly used for writing bootloaders, operating systems, and firmware due to its direct interaction with CPU instructions.

What is Assembly?

500

This cryptographic hash function, commonly used in passwords, is considered weak due to its vulnerability to rainbow table attacks.

What is MD5?

500

The term “bug” in computing was popularized after a literal insect was found in this type of machine.

What is a computer relay?

500

This type of synchronization mechanism prevents multiple threads from modifying a resource simultaneously.

What is a mutex?

500

This media format was rewound with a pencil when it got tangled.

What is a cassette tape?